Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/18820
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMITTAL, SHREEYA-
dc.date.accessioned2022-02-21T08:29:57Z-
dc.date.available2022-02-21T08:29:57Z-
dc.date.issued2020-10-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/18820-
dc.description.abstractIn the present world huge amounts of data are stored and transferred from one location to another. The data when transferred or stored is primed exposed to attack. Although various techniques or applications are available to protect data, loopholes exist. The role of Intrusion Detection System (IDS) has been inevitable in the area of Information and Network Security – especially for building a good network defense infrastructure. Anomaly based intrusion detection technique is one of the building blocks of such a foundation. Thus to analyze data and to determine various kind of attack, data mining techniques have emerged to make it less vulnerable. Anomaly detection uses these data mining techniques to detect the surprising behavior hidden within data increasing the chances of being intruded or attacked. Various hybrid approaches have also been made in order to detect known and unknown attacks more accurately. This paper presents a number of anomaly detection techniques that have been presented by various researchers.en_US
dc.language.isoenen_US
dc.publisherDELHI TECHNOLOGICAL UNIVERSITYen_US
dc.relation.ispartofseriesTD - 5352;-
dc.subjectINTRUSION DETECTION SYSTEM (IDS)en_US
dc.subjectDATA MINING TECHNIQUESen_US
dc.subjectANOMALY DETECTIONen_US
dc.subjectHYBRID APPROACHESen_US
dc.titleANOMALY DETECTION TECHNIQUESen_US
dc.typeThesisen_US
Appears in Collections:M.E./M.Tech. Computer Engineering

Files in This Item:
File Description SizeFormat 
Shreeya Thesis.pdf770.64 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.